您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
removes ads routed over the current domain (identified using referrerpolicy=unsafe-url)
Very basic global script that hides all elements in the form of [referrerpolicy="unsafe-url"].
It's a technique that is currently being widely deployed to stop domain based adblockers (such as adblockplus, ublockorigin and many many more) by routing the ad over the domain you're currently visiting. So ad.jpg won't come from https:/ad.net.work/ad.jpg but from https:/my.normal.site/ad.jpg.
The ad still comes from the ad-server, but is routed over the current domain. Because of that, browsers will trust that url (it's the same domain, so everything should be safe, right?) and submit the full referrer within the http-request to ad.jpg, including potential session or login parameters, etc. Because malicious all ads could will misuse that information, sites use the referrerpolicy-attribute and limit the referrer that is sent to the ad, thus limiting the security risk for the user.
Because there is absolutely no reason to do this for any other reason, it's a good way to identify ads. At least for a few years until the farts at the ad companies think about something new to disrupt our browsing.
If you want to use this in adblockplus, the filter is: ##[referrerpolicy="unsafe-url"]
Note that this only works on the initial page call, not on content that is loaded via ajax.
Be aware, this is a global script (will be loaded in every domain). So i advise everyone to disable automatic updates on this script. I take good care of my account, but i'm not prone to hacking or misuse. Never enable auto update on global scripts.
QingJ © 2025
镜像随时可能失效,请加Q群300939539或关注我们的公众号极客氢云获取最新地址